(S2.3) Security Spotlight: How cyber criminals can steal millions in seconds and how to fight back. Johannesburg



Similar documents
Решения HP по информационной безопасности

Security Operation Centre 5th generation

Find the intruders using correlation and context Ofer Shezaf

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Changing the Enterprise Security Landscape

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Enterprise Security and Risk Management

(S2.1) The importance of security intelligence in choosing a network protection system. Johannesburg

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

The Evolution of Application Monitoring

Connected Intelligence and the 21 st Century Digital Enterprise

The 2014 Next Generation Firewall Challenge

2012 North American Managed Security Service Providers Growth Leadership Award

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

HP ESP 2013 Solution Roadmap

High End Information Security Services

Continuous Network Monitoring

HP Next-Generation Network Security Solutions Radoslav Georgiev Technical Consultant HP Networking

How To Buy Nitro Security

Q1 Labs Corporate Overview

HP Fortify Software Security Center

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

IBM QRadar Security Intelligence April 2013

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

The Hillstone and Trend Micro Joint Solution

QRadar SIEM and Zscaler Nanolog Streaming Service

Cybersecurity: What CFO s Need to Know

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

QRadar SIEM and FireEye MPS Integration

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Modern IT Security. Jerry Craft Sr. Security & Networking Consultant

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Партнерство с HP ESP Сильная Команда и Безопасное Будущее

Testing the Security of your Applications

Caretower s SIEM Managed Security Services

Vulnerability Management

Increase insight. Reduce risk. Feel confident.

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

From the Bottom to the Top: The Evolution of Application Monitoring

What is Security Intelligence?

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

#ITtrends #ITTRENDS SYMANTEC VISION

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

End-user Security Analytics Strengthens Protection with ArcSight

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Protect Your Universe with ArcSight

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Assuring Application Security: Deploying Code that Keeps Data Safe

Testing the Security of your Applications

Payment Card Industry Data Security Standard

Software EMEA Performance Tour Berlin, Germany June

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Application Security in the Software Development Lifecycle

Requirements When Considering a Next- Generation Firewall

Logging In: Auditing Cybersecurity in an Unsecure World

Delivering Control with Context Across the Extended Network

UNIVERSE. Protect Your. with ArcSight

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

IBM Security IBM Corporation IBM Corporation

Discover 2014 Update Big Data changes everything. Roy Ritthaler Vice President, IT Operations Management

Remote Management Services Portfolio Overview

Address C-level Cybersecurity issues to enable and secure Digital transformation

SourceFireNext-Generation IPS

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Information Technology Security Review April 16, 2012

A COMPLETE APPROACH TO SECURITY

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Simple. Smart. Professional. A 2BSecured Company

BOARD OF GOVERNORS MEETING JUNE 25, 2014

Conquering PCI DSS Compliance

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Combating a new generation of cybercriminal with in-depth security monitoring

White Paper The Dynamic Nature of Virtualization Security

HP NonStop Server Security and HP ArcSight SIEM

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

A Case for Managed Security

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Advanced Threats: The New World Order

BMC s Security Strategy for ITSM in the SaaS Environment

FIVE PRACTICAL STEPS

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

HP TippingPoint A New Approach to Malware Defense Featuring Analyst Research

Axial, Gigamon and Forescout Value Proposition

Security Information & Event Management (SIEM)

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

All about Threat Central

How To Build Security By Silo

Bridging the gap between COTS tool alerting and raw data analysis

Bringing Continuous Security to the Global Enterprise

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Transcription:

(S2.3) Security Spotlight: How cyber criminals can steal millions in seconds and how to fight back Johannesburg

Bharat Mistry Security Chief Technologist HP Enterprise Security

Tweet using #HPWorldZA Johannesburg

In Hours, Thieves Took $45 Million in A.T.M. Scheme Sony drops PSN breach appeal after risk assessment Executive order leads to 'build it right' security guidelines Paul Christman, Special for CyberTruth 10:38 a.m. EDT July 10, 2013 Every day, the federal government is faced with the task of protecting vital data and assets for our nation's security. The need for a strong cybersecurity framework and resilient protection against attacks was amplified in 2012, when federal agencies reported nearly 50,000 incidents of cyber attacks. PlayStation creator decides to pay hefty fine for 2011 data breach, cites confidentiality of network security as reason for walking away from appeal By Steve Ragan, Staff Writer July 15, 2013 Thumb Drive Security: Snowden 1, NSA 0 Mathew J. Schwartz Thumb drives helped NSA whistle-blower Edward Snowden transport top-secret data from the agency. If the NSA can't keep a lid on thumb drives, can you? D'OH! Use Tumblr on iphone or ipad, give your password to the WORLD By John Leyden, July 2013 Tumblr's ios app fails to log users in through a secure (SSL) server, it has emerged. As a result users' plaintext passwords are exposed to anyone able to sniff traffic on any Wi-Fi network an ios user happens to use to connect to the popular cats'n'grumble freecontent platform. 4

5

6

7

8

Challenges you are facing 1 Nature and motivation of attacks (Fame to fortune, market adversary) Research Infiltration Exfiltration Discovery Capture Delivery Transformation of enterprise IT Traditional DC Private cloud Managed cloud Public cloud 2 (Delivery and consumption changes) Consumption Virtual desktops Notebooks Tablets Smart phones Regulatory pressures Basel III 3 (Increasing cost and complexity) 9

HACKTIVIST 10

ORGANIZE SPECIALIZE MONETIZE 11

12

13

HP Security Research Innovative research Ecosystem partner SANS, CERT, NIST, OSVDB, software, and reputation vendors ~3000 researchers 2000+ customers sharing data 7000+ managed networks globally Actionable security intelligence HP Security Research ESS Automatically integrated into HP products HP finds more vulnerabilities than the rest of the market combined Top security vulnerability research organization for the past three years Frost & Sullivan Thought leadership 14

15

HP TippingPoint protects users, apps and data with market leading network security SFDC Box Google 16

HP TippingPoint protects users, apps and data with market leading network security Simple Easy-to-use, configure and install with centralized management Effective Industry leading security intelligence with weekly DVLabs updates Reliable NGIPS with 99.99999% network uptime track record 17

Gartner Leadership Quadrant 2013 HP TippingPoint has been in the leadership quadrant 9 years in a row! The TippingPoint IPS products have a broad model range of purpose-built appliances, and are known for low latency and high throughput. Customers often cite ease of installation as a positive in product evaluations, especially for deployments with many devices. 18

Swiss Federal Railways After a rigorous open bid process with lab tests utilizing our own network traffic, we selected the HP TippingPoint Next Generation IPS 7500NX. We searched for an IPS with minimal administrative effort, and this solution allows us to protect our network infrastructure using TippingPoint s easy-to-use but powerful security policies. Erwin Jud, Lead Engineer for IPS Project 19

84% of breaches occur at the application layer 9/10 mobile applications are vulnerable to attack 20

HP Fortify helps you protect your applications In-house Outsourced Commercial Open source Application assessment Software security assurance Application protection Assess Find security vulnerabilities in any type of software Assure Fix security flaws in source code before it ships Protect Fortify applications against attack in production 21

HP Fortify named leader in Gartner AST MQ HP Fortify has been named a leader in the Gartner 2013 Magic Quadrant for Application Security Testing (AST), a position it has held in every application security Magic Quadrant Gartner has ever issued. Gartner acknowledged Fortify s years of successful market execution and continued innovation by scoring it highest in completeness of vision and near the top in ability to execute. 22

SAP Enterprise software Client outcome Significantly enhanced the security of SAP software, with increased number of security patches since 2010 Met board requirements for product security Protected revenue-generating applications and customer reputation 23

Novagalicia Banco HP Fortify on Demand not only helps us improve application quality in terms of security, it also increases our developers awareness of security issues and use of best practices a key component of PCI compliance. Roberto Baratta, CISO Novagalicia Banco 24

25

days average time to detect breach 2013 January February March April May June July August September October November December 2014 January February March April 26

Security is complex, ArcSight helps you. Get Control Get Efficient Get Compliant Transform Big Data into actionable security intelligence Faster resolution with fewer resources Automate your compliance out-of-the box 27

The #1 real time security correlation platform Comprehensive solution for data collection from 350+ log generating sources 28

HP ArcSight named leader in Gartner SIEM MQ 2013 HP ArcSight named a leader in the Gartner Magic Quadrant for Security Information and Event Management (SIEM), 10 years in a row. The most visionary product in the Gartner SIEM MQ 29

Vodafone Telecommunications We receive 550 million events per week from our security systems. Due to the aggregation and correlation capabilities of HP ArcSight ESM, those events are reduced to about 50,000 prioritized events. That s an efficiency factor of 1 to 11,000! Manfred Troeder, Head of Global Security Operations Center 30

31

HP Atalla secures data and payments Protecting customers, mitigating risk, and supporting compliance requirements with leading technology for encryption and key management Reliable High performance cryptography and key management for card payments and data protection Secure Cryptographic keys and operations are protected by FIPS 140-2 validated solutions Compliant Solutions support government and financial industry standards 32

HP HAVEn helps you monitor the assets that matter HP ArcSight with IDOL People generate data IDOL Machines generate data ESM 33

34

Since 2009, time to resolve an attack has grown % 35

2/5 on maturity continuum 24% fail to meet security requirements 30% fail to meet compliance 36

Delivering capabilities for our clients Disrupt the adversary, manage risk, and extend clients capabilities Disrupt the adversary Manage risk Extend your your capabilities Security Technology Stop internal and external adversaries Real-time threat disruption Crowd sourced security intelligence Security Consulting Reduce complexity and risk Security assessment to achieve compliance Access to HP s 5,000 security specialists Managed Security Services Respond faster to security incidents Improve risk posture Global and local standards knowledge 37

HP Security: Helping customers manage risk Offerings to strengthen security posture, proactively manage incidents, and extend security capabilities 38

Providing enterprise-level security focus Security Consulting Expertise to help clients understand, manage, and reduce business and security risks 39

Security Consulting: Manage risk and compliance HP Security Consulting provides expertise to help you gain deeper understanding of your security posture, identify security risks that will impact organizational objectives, and manage them to reduce complexity and harden your defenses. 40

HPs next-gen SOCs provide 24*7 monitoring & management Features of SOC and HP MSS: 24*7*365 monitoring + management capability Local knowledge for regional regulatory support Integration into a global threat profile with collaboration + communication across SOCs Targeted Threat Intelligence via the HP MSS Portal 41 Client benefits: Helps alleviate the burden on constrained resources Improved intelligence sharing and response to threats Better identification and faster response to incidents For quicker restoration time and reduced impact on the organisation

HP Services provides quick, effective breach response Enterprise Security Services Get deep visibility and take action to address and stop attacks Deploy remediating products fast Integration with Breach Response Services 42

HPs footprint: Industry leading scale 43

HP s industry-leading scale 9 Major banks out of 10 10 out of 10 Top telecoms All major branches US Department of Defense 9 out of 10 Top software companies 5000+ HP Security Professionals 47m HP Secured User Accounts 44 23billion Monthly security events 1000+ HP managed security customers

Thank You

Tweet using #HPWorldZA Johannesburg